Greg Flashcards

Learn information

1
Q

How many bytes make up a MAC address?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many bits make up a MAC address?

A

48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The OUI (organizationally unique identifier) are assigned by the IEEE to the m___________.

A

manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

THE OUI is represented by the f________ t_______ bytes in the MAC address

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The l________ t_________ bytes in the MAC address are usually assigned s_____________ which allows for u____________; duplications are rare.

A

last three
sequentially
uniqueness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command to determine MAC address

A

ipconfig /all

ipconfig then space forward slash all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The physical unique address of the network interface card burned on the network adapter card; allows internetwork communication

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI level of MAC address

A

Layer 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP/IP level of MAC address

A

Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI level of IP address

A

Layer 3 Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many bytes make up an IP address

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many bits make up an IP address

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Command to determine IP address

A

ipconfig /all

ipconfig then space forward slash all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logical Address that allows network to network communication via routers (Distant WAN communication); represented in dotted decimal notation)

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Local Area Network (LAN) is a collection of computers and other network devices that fit within the scope of a ___________ p_________ network

A

single physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Wide Area Network (WAN) is an internetwork that connects m_________ s_______ and spans l________ g_________ r____________.

A

multiple sites; large geographic regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unlike a WAN, a LAN may reside in only a __________ location

A

single

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Examples of a WAN

A

Internet; different buildings of a campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

With peer-to-peer architecture all computers on the networks are peers. There are no dedicated s_________.

A

servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Peer-to-peer architecture

There is no c__________ c_________ over shared resources. Any individual machine can share its resources as it pleases.

A

centralized control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Peer-to-peer architecture

All computers on the network can act as either a client ( r__________ resources) or a server ( p________ resources)

A

receive; provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Client/Server Architecture

Network is composed of clients and servers. Servers provide c__________ c__________ over network resources, i.e. files, printers, authentication,etc

A

centralized control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Client/Server Architecture

____________ receive resources
_________________ provide resources

A

clients; servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Connects LANs to other LANs, routes traffic across the Internet

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Protects network from malicious packets of data; keeps the bad stuff out
Firewall
26
Connects devices together within a LAN; switches traffic within a LAN
Switch
27
Servers | Type of server that manages access control on the network. Ex. Microsoft Active Directory
Authentication Server
28
Servers Type of server that stores and dispenses files
File Server
29
Servers | Type of server that is the network's post office, which handles email functions. Ex. Microsoft Exchange
Mail Server
30
Servers | Type of server that manages all printers on the network
Print Server
31
Servers | Type of server that manages web-based activities on the network. Ex. Microsoft IIS and Apache
Web Server
32
Servers | Type of server that manges network applications
Application Server
33
Server | Type of server that stores data in the form of a relational database Ex. Microsoft SQL Server, Oracle, MySQL
Database Server
34
Useful in planning a new network; shows the network on a "map"; assists in understanding signal flow
Network topologies
35
Network topologies All devices are connected to a central device; usually a switch or a hub; popular topology in today's networks; used in most large and small networks.
Star topology
36
Star toplogy has a built in fault tolerance (as long as the central devices doesn't go down the network will continue to work; central device is a s_____ point of f_________
single; failure
37
Network topologies Each device is connected to every other device by separate cabling Highly redundant and fault tolerance
Mesh Topology
38
Mesh topology Used in W______ Expensive to install
WANs
39
Network Topology One to One Connection Seen in Connections between buildings
Point to Point Topology
40
Point to Point Topology Often used as d________ secure ______ link Doesn't provide r___________
dedicated WAN redundancy
41
Network Topology A combination of multiple physical topologies Almost all networks are this type of network topology Ex. Star, Mesh and Point to Point Topologies combined
Hybrid
42
The network adapter installed on your computer that provides the physical and electrical connections to the network media. Can either be an expansion card or built directly into the motherboard.
Network Interface Card (NIC)
43
Older device used to connect devices together within a network. Replaced by switches
Hub
44
``` Hub Multi-port repeater -Traffic goes in one port and is repeated out e______ o______ p________ -OSI Layer 1 device -Dumb network device -Less secure ```
every other port
45
Connects Devices together just like a hub; intelligent network device
Switch
46
Switches use ________ address to communicate
MAC
47
Switch memorizes the M_______ A_________ of each device connect to it via a M________ A_______ T_______
MAC address | MAC address table
48
Switch - Traffic goes in one port and is repeated out to o_______ d_________ port - Designed for high bandwidth - Standard in Today's Network Infrastructure - More secure
only destination
49
What OSI Layer are Hubs
1
50
What OSI Layer are Switches
2
51
MAC address devices usually are what OSI level
2
52
Switches learn MAC addresses by ____ MAC address
source
53
Whenever you send a packet of information it includes the ________ MAC address (where it is coming from) as well as _________ MAC Address (where you want to send the data.
source;destination
54
Extends the Wired Network onto the WIreless Network
Wireless Access Point (WAP)
55
WAP is not a wireless r________
router
56
WAP allows moible users to connect to a w________ n________ wirelessly
wired network
57
__________ are used to connect different networks together;
Router;
58
Routers route traffics between networks using ________ ___________
IP addresses
59
What OSI layer are routers?
Layer 3
60
Packet Routing Process If computer A wants to communicate with computer C, it knows based upon its IP address configuration that Computer C is not on its network. So, it sends a packet of data to Router 1, its configured ___________ _________.
Default Gateway
61
Packet Routing Process The default gateway router, using a selected ________ _________ routes the packet of information through the Internet or a WAN via router h_____ until the packet either reaches its destiantion network or the packet is timed out.
routing protocol | hops
62
Protects your LAN from malciious activity on the internet
Firewall
63
Firewall Prevents u__________ network traffic on different networks from accessing your network and vice versa
unwanted
64
A firewall can be a standalone network ______________ or __________ on a computer system, meaning network based or host based
device;software
65
Automatically assigns IP addresses to hosts
Dynamic Host Configuration Protocol (DHCP)
66
Twisted-Pair Cooper Cabling (the most commonly used in networks) is twisted because it helps to reduce i_________such as cross talk and noise (electromagnetic interference)
interference
67
Twisted-Pair Cooper Cabling can only go _______- meters maximum before the signal gets too weak
100
68
Type of Twisted Pair Network Cabling that is used to connect non-similar devices such as - switch to router - computer to switch - switch to wireless access point
Straight-Through Cable
69
Type of Twisted Pair Cabling that is used to connect similar devices such as - computer to computer - switch to switch - router directly connected to computer
Crossover cable
70
Used to learn order of OSI layers
Please Do Not Throw Sausage Pizza Away
71
OSI layers
``` Application Presentation Layer Session Layer Transport Layer Network Layer Data Link (MAC) Layer Physical Layer ```
72
OSI Layers: Application Layer-Layer 7 | Where u________ communicate to the computer
users
73
OSI Layers: Application Layer-Layer 7 Acts as an i_________ between the application program and the network Provies an i___________ for Internet Explorer or Outlook to communicate with the network
interface | interface
74
OSI Layers: Application Layer-Layer 7 Applications don't r__________ in the application layer protocol, but instead interfaces with application-layer protocols Ex. Internet Explorer interfacing with HTTP protocol
don't reside
75
OSI Layers: Presentation Layer-Layer 6 Ensures that data transferred from one system's application layer can be r______ by the application layer on another one.
read
76
OSI Layers: Presentation Layer-Layer 6 Character encoding; Acts as the t___________ and f_______
translator; formatter
77
OSI Layers: Presentation Layer-Layer 6 Application e_________ Example: Internet Explorer HTML converted to ASCII format
encryption
78
OSI Layers: Session Layer-Layer 5 Responsible for s________ u____; m________ and then t_______ d_______ sessions between presentation-layer entities
setting up; managing; tearing down
79
OSI Layers: Session Layer- Layer 5 C__________ c__________ between systems. -start, stop, restart sessions
Coordinates communication
80
OSI Layers: Transport Layer-Layer 4 Ensures that d_______ a_____ safely at its destiantion
data arrives
81
OSI Layers: Transport Layer-Layer 4 S________ and r_________ data into a data stream
Segments; reassembles
82
OSI Layer considered to be the Post Office Layer
Layer 4-Transport Layer
83
OSI Layer known as the Routing Layer
Layer 3: Network Layer
84
OSI Layers: Network Layer-Layer 3 Provides a________________ and r___________ services
addressing; routing
85
OSI Layers: Network Layer-Layer 3 Places two addresses in the packet -_______________ address and _____________ address
source; destination
86
OSI Layers: Network Layer-Layer 3 I_________ P________ -The primary network protocol used on the internet, IPv4, IPv6 logical address
Internet Protocol (IP)
87
OSI layer that provides physical transmission of the data
Layer 2-Data Link Layer
88
OSI Layers: Data Link Layer-Layer 2 Ensures that messages are delivered to the proper devices on a _______ using __________ address -________ address -the basic fundamental addressing on the network to be able to send traffic from one devices to antoher
LAN; hardware | MAC
89
OSI Layers: Data Link Layer-Layer 2 Translates messages from the n_______ layer into bits for the p________ layer
network; physical
90
OSI layer known as the switching Layer
Layer 2-Data Link Layer
91
OSI Layers: Physical layer-Layer 1 The physics of the network - sends b______ and receives b______ ( 1 or 0) - Singaling, cabling, connectors - This layer isn't about p________
bits;bits | protocols
92
Data e_____________ and d_________ occurs when data moves down and up the OSI model
encapsulation; decapsulation
93
Encapsulation is when we ________ chunks of information to network data (IP, MAC, etc)
add
94
Encapsulation occurs when we _________ data from a computer
send
95
Decapsulation is when we ________ chunks of information from network data
remove
96
Decapsulation occurs when we _________ data at a computer
receive
97
Protocol that resolves the IP address to the MAC address
ARP (Address Resolution Protocol)
98
Finds the hardware address of a host from a known IP address | -And vice versa (RARP)
Address Resolution Protocol
99
Without ARP, nothing can c____________ across the nwtowrk
communicate
100
ARP command
arp -a | arp space dash a
101
If a computer knows an IP address but not the MAC address, it will send a _________ message to all of the devices on the LAN asking what device is assigned that IP address
broadcast
102
Primary internet protocol
IPv4
103
IP version 4 A__________ and t________ data from one network node to another
Addresses; transports
104
IP version 4 It's job is to get d_____ from one side of the internet tot the other
data
105
IP version 4 Moves data b_______ and f______ throughout the internet via routing
back;forth
106
IP version 4 Looks at each packet's destination _____ a______, the uses a r_______ t_________ to dtermine where to send it. -A connectionless protocol-fires and forgets"
IP address; routing table
107
The next generation Internet Protocol; developed because we are running out of IPv4 addresses
IP version 6 (IPv6)
108
IP version 6 is a _______ bit address
128
109
IP version 6 improves r__________, s________, efficiency, and more.
routing; security
110
Sends management messages between systems - echo request, echo reply - destination unreachable - Ping command
ICMP (Internet Control Message Protocol)
111
ICMP provides e_______ c________ and reporting functionality. Great tool for t____________ a network.
error checking; troubleshooting
112
ICMP command
ping space dash the address to be pinged Ex. ping -google.com ping -?
113
Transmission Control Protocol | -Assures delivery of packets through e____-c______ (data sequencing)
error-checking
114
``` Transmission Control Protocol Connection Oriented: 3 way handshake -SYN --->SYN/ACK--->ACK -r_________ delivery -virtual connection between 2 devices ```
reliable
115
A scaled-down, economic version of TCP
User Datagram Protocol
116
UDP-User Datagram Protocol - c__________ and u_________ - No Data r_________ - "Best effort" - used a lot for streaming real-time data: voIP, video streams, audio streams
connectionless;unreliable | retransmission
117
With reliability and assurance, comes a cost. _____ packets are much larger than _______ packets, so they take more bandwidth.
TCP; UDP
118
If you need to reliabily deliver IP packets which transport layer protocl should be used?
TCP
119
If you need fast, economical IP packet delivery which transport protocl should be used?
UDP
120
Management protocol that converts domain name to IP address Ex. google.com--->74.125.224.52
Domain Name Services (DNS)
121
DNS command
NSLOOKUP
122
Management program that automatically synchronizes clocks on network devices
Network Time Protocol (NTP)
123
Mangement protocol that is used for network mangement and maintenance
SNMP-SImple Network Management Protocol
124
Communication Protocol that: - Provides a virtual terminal protocol logging into and managing devices remotely - Not used often anymore because unencrypted communication
Telnet (TCP)
125
Communication Protocol that - Looks and acts like telnet, but communicationis encrypted - PuTTY SSH Client Popular
SSH-Secure Shell (TCP)
126
File transfer application that: - Transfers files between systems - authentications with a username and password - full-featured functionality (list, add, delete,etc.)
FTP-FIle Transfer Protocol
127
File transfer applicaiton that - very simple file transfer appliation - can send adn receive files; no directory browsing - no authentication
TFTP-Trivial File Transfer Protocol
128
Mail application protocol that's: - used most often for sending mail - transferring between mail servers
Simple Mail Transsfer Protocol (TCP)
129
Mail application protocol that's used to: - receive email - designed for intermittent connectivity
Post Office Protocl version 3 (TCP)
130
Mail application protoocl that's used to: -allows users to access email on servers and either read the email on the server or download the email to the client machine
Internet Message Access Protocl v4 (TCP)
131
Browser application protocol that porovides for browsing services for the WWW
HTTP-Hypertext Transfer Protocol (TCP)
132
Browser application that provides for access to resources on the internet in a secure fashion; encryption via TLS/SSL
HTTPS- Hypertext transfer protocol secure (TCP)
133
Browser application that utilizes cryptographic protocols for enabling secure online data-transfer activities
TLS/SSL-Transport Layer Security and Secure socket layer
134
Voice over IP (VoIP) protocols Sets up and tears downvoice and video calls over the itnernet
SIP (Session Initiation Protocol) TCP
135
Voice over IP (VoIP) protocols The standard for delivering audio and video over the internet. Commonly employed for streaming media, video conferencing, and VoIP.
RTP (Real-Time Transport Protocol (UDP)
136
Voice over IP (VoIP) protocols Will commonly use reliable ____to set-up and manage the session, but _____to send the real-time data.
TCP; UDP
137
Computers require ports because of network applicaiton m____________
multitasking
138
Ports allow you to associate packets with ____/_____ protocols
TCP/IP
139
Because a computer has 1 IP and MAC address, it needs ports to differentiate network p__________ and s_______
protocols; services
140
Communication originates from your computer utilizing a h____________ r_______ p______ to communicate across a LAN/WAN/Internet to communicate with a remote server, in this case a web server. The Web will be listening in on specific ports for its associated TCP/IP protocols.
high random port
141
- Logical addresses - Allows network to network communication via routers - WAN communication - Dotted Decimal Notation
Network
142
What OSI Layer are Network addresses (IP addresses on)
Network Layer (OSI Layer 3)
143
- Physical Addresses - Allows internetwork communication via hubs, switches, and routers - LAN communication (switching) - Physically burned on NIC
MAC address (OSIL Layer 2)
144
Two parts of an IP address
Network address+Host Address=IP address
145
Part of an IP address that uniquely identifies each network
Network Address
146
Part of an IP address that uniquely identifies each machine on a network
Host Address
147
A private IP address is a n_________ IP address
non-routable
148
If a router receives a private IP address, it will ________ it.
drop
149
Private IP addresses are unable to communicate across the ______. Uses Network Address Translation (NAT) to route traffic from network to network. -c________ one address to another to allow a private IP address to communicate with the WAN through the public address.
WAN | converts
150
The process of breaking up Class A, B, and C networks into smaller, more manageable networks
Subnetting
151
We b_________ host bits to create more s_________ for a Class A, B, or C network
borrow; sub-networks
152
When you borrow host bits, you ________ the amount of sub-networks, aka Subnets available to you and __________ the amount of host IP addresses available to you.
increase; decrease
153
Subnetting allows you to create m______ l_______ n_______ that exist within a single Class A, B, or C network -i.e., break a major network down into multiple smaller sub-networks, i.e. subnets
multiple logical networks
154
If you don't subnet, you are only able to use _____ network from Class A, B, or C network, which isn't realistic
one